Authorized Redundant Check Support in a Hybrid Cloud Environment

Author:

Chandan R 1,Prashant Ankalkoti 1

Affiliation:

1. Jawaharlal Nehru New College of Engineering, Shivamogga, India

Abstract

Data deduplication is one of the most significant data contraction ways for removing indistinguishable clones of recreating data, and it's generally used in pall storehouse to minimise storehouse space and save bandwidth. The coincident encryption approach has been developed to cipher the data before outsourcing to insure the confidentiality of sensitive data while easing deduplication. This work is the first attempt to explicitly address the content of authorised data deduplication in order to ameliorate data security. In discrepancy to standard deduplication systems, the discriminational boons of druggies are taken into account in indistinguishable check in addition to the data itself. In addition, we describe numerous innovative deduplication infrastructures that give authorised indistinguishable check in a cold-blooded pallarchitecture. Our approach is secure in terms of the delineations stated in the proposed security model, according to security analysis. We apply a prototype of our proposed authorised indistinguishable check medium as a evidence of conception and take over testbed tests with it. We demonstrate that our proposed authorised indistinguishable check fashion has a low outflow when compared to typical operations

Publisher

Naksh Solutions

Subject

General Medicine

Reference8 articles.

1. OpenSSL Project. http://www.openssl.org/.

2. P. Anderson and L. Zhang. Backups for laptops that are both speedy and safe, thanks to the use of encrypted de-duplication technology. Proceedings of the USENIX LISA Conference in the Year 2010.

3. M. Bellare, S. Keelveedhi, and T. Ristenpart. The term "Dupless" refers to a server-assisted encryption method for deduplicated storage. provided as a presentation at the USENIX Security Symposium in 2013.

4. M. Bellare, S. Keelveedhi, and T. Ristenpart. It is possible to utilise both message-locked encryption as well as safe data duplication. Between pages 296 and 312 of the 2013 edition of EUROCRYPT.

5. This article was written by M. Bellare, C. Namprempre, and G. Neven, according to the citation in footnote number 5. Proofs of security for approaches that rely on identities to identify signers and signers themselves. Pages 1–61 were included in the 2009 version of the Journal of Cryptology, which was published as volume 22, number 1.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3